• Title/Summary/Keyword: 전력관리 시스템

Search Result 1,236, Processing Time 0.032 seconds

A Study for BIM based Evaluation and Process for Architectural Design Competition -Case Study of Domestic and International BIM-based Competition (BIM기반의 건축설계경기 평가 및 절차에 관한 연구 -국내외 BIM기반 건축설계경기 사례를 기반으로-)

  • Park, Seung-Hwa;Hong, Chang-Hee
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.2
    • /
    • pp.23-30
    • /
    • 2017
  • In the AEC(Architecture, Engineering and Construction) industry, BIM(Building Information Modeling) technology not only helps design intent efficiently, but also realizes an object-oriented design including building's life cycle information. Thus it can manage all data created in each building stage and the roles of BIM are greatly expanded. Contractors and designers have been trying to adopt BIM to design competitions and validate it for the best result in various aspects. Via the computational simulation which differs from the existing process, effective evaluation can be done. For this process, a modeling guideline for each kind of BIM tool and a validation system for the confidential assessment are required. This paper explains a new process about design evaluation methods and process using BIM technologies which follow the new paradigm in construction industry through complement points by an example of a competition activity of the Korea Power Exchange(KPX) headquarter office. In conclusion, this paper provides a basic data input guideline based on open BIM for automatic assessment and interoperability between different BIM systems and suggests a practical usage of the rule-based Model Checker.

Multi-family Housing Complex Breakdown Structure for Decision Making on Rehabilitation (노후 공동주택 개선여부 의사결정을 위한 공동주택 분류체계 개발)

  • Hong, Tae-Hoon;Kim, Hyun-Joong;Koo, Choong-Wan;Park, Sung-Ki
    • Korean Journal of Construction Engineering and Management
    • /
    • v.12 no.6
    • /
    • pp.101-109
    • /
    • 2011
  • As climate change is becoming the main issue, various efforts are focused on saving building energy consumption both at home and abroad. In particular, it is very important to save energy by maintenance, repair and rehabilitation of existing multi-family housing complex, because energy consumption in residential buildings is not only forming a great part of gross energy consumption in Korea but the number of deteriorated complexes is also sharply increasing. However, energy saving is not considered as a main factor in decision making on rehabilitation project. Also, any supporting tool is not appropriately prepared in existing process. As the first step for development of decision support system on rehabilitation, this paper developed a breakdown structure, which makes clusters of multi-family housing complexes. Decision tree, one of data mining methods, was used to make clusters based on the characteristics and energy consumption data of multi-family housing complexes. Energy saving and CO2 reduction will be maximized by considering energy consumption during rehabilitation process of multi-family housing complex, based on these results and following research.

A study for Information Security Risk Assessment Methodology Improvement by blockade and security system level assessment (봉쇄와 보안장비 수준평가를 통한 정보보호 위험평가 개선 연구)

  • Han, Choong-Hee;Han, ChangHee
    • Convergence Security Journal
    • /
    • v.20 no.4
    • /
    • pp.187-196
    • /
    • 2020
  • In order to manage information security risk, various information security level evaluation and information security management system certification have been conducted on a larger scale than ever. However, there are continuous cases of infringement of information protection for companies with excellent information security evaluation and companies with excellent information security management system certification. The existing information security risk management methodology identifies and analyzes risks by identifying information assets inside the information system. Existing information security risk management methodology lacks a review of where cyber threats come from and whether security devices are properly operated for each route. In order to improve the current risk management plan, it is necessary to look at where cyber threats come from and improve the containment level for each inflow section to absolutely reduce unnecessary cyber threats. In addition, it is essential to measure and improve the appropriate configuration and operational level of security equipment that is currently overlooked in the risk management methodology. It is necessary to block and enter cyber threats as much as possible, and to detect and respond to cyber threats that inevitably pass through open niches and use security devices. Therefore, this paper proposes additional evaluation items for evaluating the containment level against cyber threats in the ISMS-P authentication items and vulnerability analysis and evaluation items for major information and communication infrastructures, and evaluates the level of security equipment configuration for each inflow.

An Extended ED-H Real-Time Scheduling Algorithm for Supporting an Intelligent PMU-Based Energy Harvesting System

  • Park, Sangsoo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.12
    • /
    • pp.17-27
    • /
    • 2022
  • In this paper, ED-H algorithm, an optimal real-time scheduling algorithm dealing with the characteristics of the integrated energy harvester system with a capacitor, is extended to satisfy the time constraint under the blackout state which is a deliberate power-off state by an intelligent power management unit adopted in the system. If the power supply system does not have enough energy, it temporarily shuts off the power supply to protect the circuit and capacitor and resumes the supply again when the capacitor is fully charged, which may delay the task execution during these blackout states by calculating the time according to the occurrence of the events. To mitigate the problem, even if task execution is delayed by the original ED-H algorithm, the remaining time of the subsequent time units no longer can afford to delay the execution of the task is predicted in the extended algorithm and the task is forced to be scheduled to meet the time deadline. According to the simulation results, it is confirmed that the algorithm proposed in this paper has a high scheduling performance increase of 0.4% to 7.7% depending on the characteristics of the set of tasks compared to the ED-H.

MAC Scheduling Algorithm for Efficient Management of Wireless Resources in Bluetooth Systems (블루투스 시스템에서의 효율적 무선자원관리를 위한 MAC 스케쥴링 기법)

  • 주양익;권오석;오종수;김용석;이태진;엄두섭;차균현
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.9A
    • /
    • pp.702-709
    • /
    • 2003
  • In this paper, we propose an efficient and QoS-aware MAC scheduling algorithm for Bluetooth, which considers both throughput and delay performance of each Master-Slave pair in scheduling decisions, and thus, attempts to maximize overall performance. The proposed algorithm, MTDPP (Modified Throughput-Delay Priority Policy), makes up for the drawbacks of T-D PP (Throughput-Delay Priority Policy) proposed in [6] and improves the performance. Since Bluetooth employs a master-driven TDD based scheduling algorithm, which is basically operated with the Round Robin policy, many slots may be wasted by POLL or NULL packets when there is no data waiting for transmission in queues. To overcome this link wastage problem, several algorithms have been proposed. Among them, queue state-based priority policy and low power mode-based algorithm can perform with high throughput and reasonable fairness. However, their performances may depend on traffic characteristics, i.e., static or dynamic, and they require additional computational and signaling overheads. In order to tackle such problems, we propose a new scheduling algorithm. Performance of our proposed algorithm is evaluated with respect to throughput and delay. Simulation results show that overall performances can be improved by selecting suitable parameters of our algorithm.

Improvement of Microwave Water Surface Current Meter and its Commercialization (전자파표면유속계의 성능개선 및 실용화)

  • Kim, Young-Sung;Lee, Hyun-Seok
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2011.05a
    • /
    • pp.85-85
    • /
    • 2011
  • 홍수기에 안전하고 정확한 유량측정을 통하여 물관리에 필요한 기초수문자료를 확보하고자 한국수자원공사에서 1993년도부터 홍수유량측정기술 확보를 위한 연구를 시작하였다. 그간의 연구성과를 바탕으로 1999년도에 하천의 유속을 비접촉식으로 측정할 수 있는 홍수용 전자파표면유속계를 개발하여 특허등록하였고 그와 동시에 이의 상품화를 추진하여 2010년도까지 75대를 보급하여 실무에서 이용하고 있다. 이동식인 홍수용 전자파표면유속계를 바탕으로 2001년도에는 고정식 실시간 홍수유량측정측정시스템을 개발하여 특허등록하였고, 이 시제품을 현재 용담 수자원시험유역의 동향지점에서 시험운영하고 있다. 또한, 현장 유량측정실무자들의 홍수용 전자파표면유속계 개선요구에 따라 편각용 전자파표면유속계 시제품을 개발하였으며, 이는 임의의 한 지점에 설치한 한 대의 장비로 좌우 여러 측선의 유속을 동시에 측정할 수 있는 다점 측정기능을 갖도록 성능을 개선하였다. 이에 따라 홍수시 유량측정에 소요되는 시간이 줄어들어 신속하게 유량측정을 완료할 수 있는 계기를 마련하였다. 이와 더불어 유속측정 범위를 확장하여 홍수시의 고유속 뿐만 아니라 0.5 m/s 이하의 저유속까지 측정할 수 있는 범용 전자파표면유속계의 시제품을 추가로 개발하였다. 이 장비는 최저유속 0.03 m/s의 측정을 실내시험을 통하여 입증하였다. 범용 전자파표면유속계는 상품화 시제품의 개발을 목표로 기존 시제품의 현장시험을 통하여 현장적용상의 문제점에 대한 해결에 주력하였다. 첫째, 평갈수용 전자파표면유속계의 사용편의를 개선하기 위하여 소형화 및 경량화를 추진하였고, 이를 위하여 사용주파수를 기존의 10 GHz에서 24 GHz로 변경함으로써 $35{\times}35\;cm$ 크기의 기존안테나를 $22{\times}22\;cm$ 크기로 소형화하였으며 송수신부의 무게는 기존 18 kg에서 3.3 kg으로 혁신적으로 줄이는데 성공하였다. 이를 위하여 안테나는 기존의 반사형안테나에서 도파관슬롯배열안테나로 변경하였다. 둘째, 측정값의 안정화를 위하여 안테나의 특성을 개선하여 부엽(side-lobe) 레벨 30 dB 이하 그리고 전후방비(front-back ratio) 50 dB 이하로 개선하여 안테나가 지향하는 방향 이외의 위치에서 반사되는 불필요한 신호를 줄였다. 또한 적응형 이득제어(adaptive gain control)기법의 채택으로 미소 신호에 대한 안정적 측정 및 과다 신호에 대한 능동적 감쇄를 할 수 있도록 시스템을 구성하여 전 유속범위에 대한 안정적 측정을 가능토록 설계 및 제작하였다. 셋째, 자가점검 기능을 탑재하여 유속측정 전에 기기의 상태에 대한 self test기능을 통하여 측정자가 기기의 상태를 사전에 파악 가능토록함으로써, 기기 오작동에 대한 능동 대처할 수 있도록 하였다. 이외에도 저전력 회로설계를 통하여 배터리 사용시간을 확장하였고, 기존의 전자파표면유속계가 가지고 있던 방습 및 방수에도 내성을 갖는 제품으로 설계하였으며 스마트기기를 이용한 무선측정 및 세련된 디자인 등 사용자의 요구사항을 충분히 반영하였다.

  • PDF

Design of Embedded Security Controller Based on Client Authentication Utilizing User Movement Information (사용자의 이동정보를 활용한 클라이언트 인증 기반의 임베디드 보안 컨트롤러 설계)

  • Hong, Suk-Won
    • Journal of Digital Convergence
    • /
    • v.18 no.3
    • /
    • pp.163-169
    • /
    • 2020
  • A smart key has been used in a variety of embedded environments and there also have been attacks from a remote place by amplifying signals at a location of a user. Existing studies on defence techniques suggest multiple sensors and hash functions to improve authentication speed; these, however, increase the electricity usage and the probability of type 1 error. For these reasons, I suggest an embedded security controller based on client authentication and user movement information improving the authentication method between a controller and a host device. I applied encryption algorithm to the suggested model for communication using an Arduino board, GPS, and Bluetooth and performed authentication through path analysis utilizing user movement information for the authentication. I found that the change in usability was nonsignificant when performing actions using the suggested model by evaluating the time to encode and decode. The embedded security controller in the model can be applied to the system of a remote controller for a two-wheeled vehicle or a mobile and stationary host device; in the process of studying, I found that encryption and decryption could take less then 100ms. The later study may deal with protocols to speed up the data communication including encryption and decryption and the path data management.

Implementation of Hypervisor for Virtualizing uC/OS-II Real Time Kernel (uC/OS-II 실시간 커널의 가상화를 위한 하이퍼바이저 구현)

  • Shin, Dong-Ha;Kim, Ji-Yeon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.5
    • /
    • pp.103-112
    • /
    • 2007
  • In this paper, we implement a hypervisor that runs multiple uC/OS-II real-time kernels on one microprocessor. The hypervisor virtualizes microprocessor and memory that are main resources managed by uC/OS-II kernel. Microprocessor is virtualized by controlling interrupts that uC/OS-II real-time kernel handles and memory is virtualized by partitioning physical memory. The hypervisor consists of three components: interrupt control routines that virtualize timer interrupt and software interrupt, a startup code that initializes the hypervisor and uC/OS-II kernels, and an API that provides communication between two kernels. The original uC/OS-II kernel needs to be modified slightly in source-code level to run on the hypervisor. We performed a real-time test and an independent computation test on Jupiter 32-bit EISC microprocessor and showed that the virtualized kernels run without problem. The result of our research can reduce the hardware cost, the system space and weight, and system power consumption when the hypervisor is applied in embedded applications that require many embedded microprocessors.

  • PDF

Model-based Efficiency Analysis for Photovoltaic Generation O&M: A Case Study (태양광발전 운전 및 유지보수를 위한 모델기반 효율분석: 사례연구)

  • Yu, Jung-Un;Park, Sung-Won;Son, Sung-Yong
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.15 no.5
    • /
    • pp.405-412
    • /
    • 2022
  • This paper studies the method of estimating power loss and classifying the factors for improving the power generation efficiency through O&M. It is installed under various climatic conditions worldwide, operational and maintenance technologies suitable for the characteristics of the installation location are required. Existing studies related to solar power generation efficiency have been actively quantifying the impact on short-term losses by environmental factors such as high temperature, dust accumulation, precipitation, humidity, and wind speed, but analysis of the overall impact from a long-term operation perspective is limited. In this study, the potential for efficiency improvement was analyzed by re-establishing a loss classification system according to the power flow of solar power to derive a comprehensive efficiency model for long-term operation and estimating power loss through a case study for each region where climate conditions are classified. As a result of the analysis, the average annual potential for improving soiling loss was 26.9%, Death Valley 7.2%, and Seoul 3.8%. Aging losses was 6.6% in the 20th year as a cumulative. The average annual potential due to temperature loss was 2.9 % for Doha, 1.9% for Death Valley, and 0.2% for Seoul.

Requirement Analysis for Agricultural Meteorology Information Service Systems based on the Fourth Industrial Revolution Technologies (4차 산업혁명 기술에 기반한 농업 기상 정보 시스템의 요구도 분석)

  • Kim, Kwang Soo;Yoo, Byoung Hyun;Hyun, Shinwoo;Kang, DaeGyoon
    • Korean Journal of Agricultural and Forest Meteorology
    • /
    • v.21 no.3
    • /
    • pp.175-186
    • /
    • 2019
  • Efforts have been made to introduce the climate smart agriculture (CSA) for adaptation to future climate conditions, which would require collection and management of site specific meteorological data. The objectives of this study were to identify requirements for construction of agricultural meteorology information service system (AMISS) using technologies that lead to the fourth industrial revolution, e.g., internet of things (IoT), artificial intelligence, and cloud computing. The IoT sensors that require low cost and low operating current would be useful to organize wireless sensor network (WSN) for collection and analysis of weather measurement data, which would help assessment of productivity for an agricultural ecosystem. It would be recommended to extend the spatial extent of the WSN to a rural community, which would benefit a greater number of farms. It is preferred to create the big data for agricultural meteorology in order to produce and evaluate the site specific data in rural areas. The digital climate map can be improved using artificial intelligence such as deep neural networks. Furthermore, cloud computing and fog computing would help reduce costs and enhance the user experience of the AMISS. In addition, it would be advantageous to combine environmental data and farm management data, e.g., price data for the produce of interest. It would also be needed to develop a mobile application whose user interface could meet the needs of stakeholders. These fourth industrial revolution technologies would facilitate the development of the AMISS and wide application of the CSA.